Systems and methods of push-based verification of a transaction
a push-based verification and transaction technology, applied in the field of digital security services, can solve the problems of limited authorization (permission to complete a transaction) without a strong notion of authentication, burden on users, and lack of authentication in present-day security systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027]The following description of the preferred embodiments of the invention is not intended to limit the invention to these preferred embodiments, but rather to enable any person skilled in the art to make and use this invention. 1. Method for Authorizing and / or Confirming an Internal / External Transaction
[0028]As shown in FIG. 1, a method 100 for authorizing and / or confirming a remote transaction via a messaging-based notification in a mobile communication device. The method 100 preferably includes registering and / or enrolling a mobile communication device of a subscriber for an account with an online authentication service S110, identifying a request for a transaction by an agent of an entity subscribed to the authentication service S120, implementing a confirmation API S130, messaging the enrolled mobile communication device with transaction request data S140, confirming or denying the request for the transaction based on a response or non-response to the messaging S150.
[0029]Ge...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


